MalwareSourceCode/MSIL/HackTool/Win32/K/HackTool.Win32.KMSAuto.i-f317ba4d4051fad64a0aa45b587fa3dcea795bac30acec2872779abe31a07cbe/TaskSchedulerInterop/PropSheetFlags.cs
2022-08-18 06:28:56 -05:00

38 lines
1.3 KiB
C#

// Decompiled with JetBrains decompiler
// Type: TaskSchedulerInterop.PropSheetFlags
// Assembly: AutoKMS, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: D1CED9E3-1FC7-49B8-B3AC-44976AB7F6E4
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\HackTool.Win32.KMSAuto.i-f317ba4d4051fad64a0aa45b587fa3dcea795bac30acec2872779abe31a07cbe.exe
using System;
namespace TaskSchedulerInterop
{
[Flags]
internal enum PropSheetFlags : uint
{
PSH_DEFAULT = 0,
PSH_PROPTITLE = 1,
PSH_USEHICON = 2,
PSH_USEICONID = 4,
PSH_PROPSHEETPAGE = 8,
PSH_WIZARDHASFINISH = 16, // 0x00000010
PSH_WIZARD = 32, // 0x00000020
PSH_USEPSTARTPAGE = 64, // 0x00000040
PSH_NOAPPLYNOW = 128, // 0x00000080
PSH_USECALLBACK = 256, // 0x00000100
PSH_HASHELP = 512, // 0x00000200
PSH_MODELESS = 1024, // 0x00000400
PSH_RTLREADING = 2048, // 0x00000800
PSH_WIZARDCONTEXTHELP = 4096, // 0x00001000
PSH_WIZARD97 = 16777216, // 0x01000000
PSH_WATERMARK = 32768, // 0x00008000
PSH_USEHBMWATERMARK = 65536, // 0x00010000
PSH_USEHPLWATERMARK = 131072, // 0x00020000
PSH_STRETCHWATERMARK = 262144, // 0x00040000
PSH_HEADER = 524288, // 0x00080000
PSH_USEHBMHEADER = 1048576, // 0x00100000
PSH_USEPAGELANG = 2097152, // 0x00200000
}
}